Follow
Shouling Ji
Shouling Ji
Zhejiang University & Georgia Institute of Technology
Verified email at gatech.edu - Homepage
Title
Cited by
Cited by
Year
Textbugger: Generating adversarial text against real-world applications
J Li, S Ji, T Du, B Li, T Wang
arXiv preprint arXiv:1812.05271, 2018
4602018
Dual encoding for zero-example video retrieval
J Dong, X Li, C Xu, S Ji, Y He, G Yang, X Wang
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019
2412019
MOPT: Optimized Mutation Scheduling for Fuzzers.
C Lyu, S Ji, C Zhang, Y Li, WH Lee, Y Song, R Beyah
USENIX Security Symposium, 1949-1966, 2019
1882019
Model-reuse attacks on deep learning systems
Y Ji, X Zhang, S Ji, X Luo, T Wang
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
1482018
Certchain: Public and efficient certificate audit based on blockchain for tls connections
J Chen, S Yao, Q Yuan, K He, S Ji, R Du
IEEE INFOCOM 2018-IEEE conference on computer communications, 2060-2068, 2018
1422018
Temporal multi-graph convolutional network for traffic flow prediction
M Lv, Z Hong, L Chen, T Chen, T Zhu, S Ji
IEEE Transactions on Intelligent Transportation Systems 22 (6), 3337-3348, 2020
1352020
Secgraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization
S Ji, W Li, P Mittal, X Hu, R Beyah
24th {USENIX} Security Symposium ({USENIX} Security 15), 303-318, 2015
1332015
Differentially private releasing via deep generative model (technical report)
X Zhang, S Ji, T Wang
arXiv preprint arXiv:1801.01594, 2018
1302018
Interpretable deep learning under fire
X Zhang, N Wang, H Shen, S Ji, X Luo, T Wang
29th {USENIX} security symposium ({USENIX} security 20), 2020
1292020
Structural data de-anonymization: Quantification, practice, and implications
S Ji, W Li, M Srivatsa, R Beyah
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
1282014
Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey
S Ji, P Mittal, R Beyah
IEEE Communications Surveys & Tutorials 19 (2), 1305-1326, 2016
1242016
Deepsec: A uniform platform for security analysis of deep learning model
X Ling, S Ji, J Zou, J Wang, C Wu, B Li, T Wang
2019 IEEE Symposium on Security and Privacy (SP), 673-690, 2019
1202019
On your social network de-anonymizablity: Quantification and large scale evaluation with seed knowledge.
S Ji, W Li, NZ Gong, P Mittal, RA Beyah
NDSS, 2015
1072015
Sirenattack: Generating adversarial audio for end-to-end acoustic systems
T Du, S Ji, J Li, Q Gu, T Wang, R Beyah
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
972020
Graph Backdoor.
Z Xi, R Pang, S Ji, T Wang
USENIX Security Symposium, 1523-1540, 2021
922021
Privacy risks of general-purpose language models
X Pan, M Zhang, S Ji, M Yang
2020 IEEE Symposium on Security and Privacy (SP), 1314-1331, 2020
852020
Structure based data de-anonymization of social networks and mobility traces
S Ji, W Li, M Srivatsa, JS He, R Beyah
Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014
722014
A tale of evil twins: Adversarial inputs versus poisoned models
R Pang, H Shen, X Zhang, S Ji, Y Vorobeychik, X Luo, A Liu, T Wang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
702020
Optimal distributed data collection for asynchronous cognitive radio networks
Z Cai, S Ji, J He, AG Bourgeois
2012 IEEE 32nd international conference on distributed computing systems …, 2012
702012
Deep dual consecutive network for human pose estimation
Z Liu, H Chen, R Feng, S Wu, S Ji, B Yang, X Wang
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021
662021
The system can't perform the operation now. Try again later.
Articles 1–20